The search functionality is under construction.
The search functionality is under construction.

Keyword Search Result

[Keyword] TE(21534hit)

9941-9960hit(21534hit)

  • Architecture and Design of IP Broadcasting System Using Passive Optical Network

    Hiroki IKEDA  Jun SUGAWA  Yoshihiro ASHI  Kenichi SAKAMOTO  

     
    PAPER

      Vol:
    E91-B No:8
      Page(s):
    2477-2484

    We propose an IP broadcasting system architecture using passive optical networks (PON) utilizing the optical broadcast links of a PON with a downstream bandwidth allocation algorithm to provide a multi-channel IP broadcasting service to home subscribers on single broadband IP network infrastructures. We introduce the design and adaptation of the optical broadcast links to effectively broadcast video contents to home subscribers. We present a performance analysis that includes the downstream bandwidth utilization efficiency of the broadcast link and the bandwidth control of the IP broadcasting and Internet data. Our analysis and simulation results show that the proposed system can provide 100 HDTV channels to every user over fiber lines. We also propose an IPTV channel selection mechanism in an ONT by selecting a broadcast stream. We developed and evaluated a prototype that can achieve a 15-msec IPTV channel selection speed.

  • SPORT: An Algorithm for Divisible Load Scheduling with Result Collection on Heterogeneous Systems

    Abhay GHATPANDE  Hidenori NAKAZATO  Olivier BEAUMONT  Hiroshi WATANABE  

     
    PAPER-Network

      Vol:
    E91-B No:8
      Page(s):
    2571-2588

    Divisible Load Theory (DLT) is an established mathematical framework to study Divisible Load Scheduling (DLS). However, traditional DLT does not address the scheduling of results back to source (i.e., result collection), nor does it comprehensively deal with system heterogeneity. In this paper, the DLSRCHETS (DLS with Result Collection on HETerogemeous Systems) problem is addressed. The few papers to date that have dealt with DLSRCHETS, proposed simplistic LIFO (Last In, First Out) and FIFO (First In, First Out) type of schedules as solutions to DLSRCHETS. In this paper, a new polynomial time heuristic algorithm, SPORT (System Parameters based Optimized Result Transfer), is proposed as a solution to the DLSRCHETS problem. With the help of simulations, it is proved that the performance of SPORT is significantly better than existing algorithms. The other major contributions of this paper include, for the first time ever, (a) the derivation of the condition to identify the presence of idle time in a FIFO schedule for two processors, (b) the identification of the limiting condition for the optimality of FIFO and LIFO schedules for two processors, and (c) the introduction of the concept of equivalent processor in DLS for heterogeneous systems with result collection.

  • Optical Fiber Line Testing System Employing 1.65 µm Test Light Bypass Module for In-Service Monitoring of ADM Ring Networks

    Yoshitaka ENOMOTO  Hisashi IZUMITA  Nobuo TOMITA  

     
    PAPER

      Vol:
    E91-B No:8
      Page(s):
    2494-2500

    This paper describes a novel optical fiber line testing system operating at 1.65 µm using test light bypass modules. We show a new testing configuration for add/drop multiplexer (ADM) ring networks. The test light bypass modules were installed in individual customer buildings so the test light can bypass the ADMs. We evaluated the bit-error performance with a 2.48832 Gbit/s ADM ring network using a prototype test light bypass module. We confirmed that this testing system can monitor the optical fiber cables of an ADM ring network, and that it causes no degradation in transmission quality. We show the operating area provided by the system dynamic range expressed in terms of fiber length and customer building number. The prototype system could monitor an ADM ring network linking five buildings with a 5 km loop. We also performed an in-service monitoring field trial in a 2.6 km ring network with three ADM nodes. This testing system enables us to reduce the operating, administration, and maintenance cost and improves the transmission quality of ADM ring networks.

  • Combining Attention Model with Hierarchical Graph Representation for Region-Based Image Retrieval

    Song-He FENG  De XU  Bing LI  

     
    LETTER-Image Recognition, Computer Vision

      Vol:
    E91-D No:8
      Page(s):
    2203-2206

    The manifold-ranking algorithm has been successfully adopted in content-based image retrieval (CBIR) in recent years. However, while the global low-level features are widely utilized in current systems, region-based features have received little attention. In this paper, a novel attention-driven transductive framework based on a hierarchical graph representation is proposed for region-based image retrieval (RBIR). This approach can be characterized by two key properties: (1) Since the issue about region significance is the key problem in region-based retrieval, a visual attention model is chosen here to measure the regions' significance. (2) A hierarchical graph representation which combines region-level with image-level similarities is utilized for the manifold-ranking method. A novel propagation energy function is defined which takes both low-level visual features and regional significance into consideration. Experimental results demonstrate that the proposed approach shows the satisfactory retrieval performance compared to the global-based and the block-based manifold-ranking methods.

  • Large Code Set for Double User Capacity and Low PAPR Level in Multicarrier Systems

    Khoirul ANWAR  Masato SAITO  Takao HARA  Minoru OKADA  

     
    PAPER-Communication Theory and Signals

      Vol:
    E91-A No:8
      Page(s):
    2183-2194

    In this paper, a new large spreading code set with a uniform low cross-correlation is proposed. The proposed code set is capable of (1) increasing the number of assigned user (capacity) in a multicarrier code division multiple access (MC-CDMA) system and (2) reducing the peak-to-average power ratio (PAPR) of an orthogonal frequency division multiplexing (OFDM) system. In this paper, we derive a new code set and present an example to demonstrate performance improvements of OFDM and MC-CDMA systems. Our proposed code set with code length of N has K=2N+1 number of codes for supporting up to (2N+1) users and exhibits lower cross correlation properties compared to the existing spreading code sets. Our results with subcarrier N=16 confirm that the proposed code set outperforms the current pseudo-orthogonal carrier interferometry (POCI) code set with gain of 5 dB at bit-error-rate (BER) level of 10-4 in the additive white Gaussian noise (AWGN) channel and gain of more than 3.6 dB in a multipath fading channel.

  • Design of Spectrally Efficient Hermite Pulses for PSM UWB Communications

    Alex CARTAGENA GORDILLO  Ryuji KOHNO  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    2016-2024

    In this paper, we propose a method for designing a set of pulses whose spectrum is efficiently contained in amplitude and bandwidth. Because these pulses are derived from and have shapes that are either equal or similar to the Hermite pulses, we name our proposed transmit pulses as spectrally efficient Hermite pulses. Given that the proposed set of pulses does not constitute an orthonormal one, we also propose a set of receive templates which permit orthonormal detection of the incoming signals at the receiver. The importance of our proposal is in the potential implementation of M-ary pulse shape modulation systems, for ultra wideband communications, with sets of pulses that are efficiently contained within a specific bandwidth and limited to a certain amplitude.

  • BER Analysis of Dual-Hop Amplify-and-Forward MIMO Relaying with Best Antenna Selection in Rayleigh Fading Channels

    Jung-Bin KIM  Dongwoo KIM  

     
    LETTER-Broadcast Systems

      Vol:
    E91-B No:8
      Page(s):
    2772-2775

    Combining relaying and multi-input multi-output (MIMO) transmission is a generic way to overcome the channel-fading impairments. Best antenna selection is a simple but efficient MIMO method that achieves the full diversity and also serves as a lower bound reference of MIMO performance. For a dual-hop MIMO system with an ideal amplify-and-forward (AF) relaying gain and best antenna selection, we provide a probability density function (PDF) of received signal-to-noise ratio (SNR) and an analytic BER equation when using M-ary PSK in Rayleigh fading channels. The analytic result is shown to exactly match with simulated one. Furthermore, the effect of link unbalance between the first hop and the second hop, due to differences in the number of antennas deployed in both hops as well as in the average power of channel coefficients, on the BER performance is numerically investigated and the results show that the links with better balance give better performance.

  • An Efficient Adaptive Minor Subspace Extraction Using Exact Nested Orthogonal Complement Structure

    Masaki MISONO  Isao YAMADA  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1867-1874

    This paper presents a new adaptive minor subspace extraction algorithm based on an idea of Peng and Yi ('07) for approximating the single minor eigenvector of a covariance matrix. By utilizing the idea inductively in the nested orthogonal complement subspaces, the proposed algorithm succeeds to relax the numerical sensitivity which has been annoying conventional adaptive minor subspace extraction algorithms for example, Oja algorithm ('82) and its stabilized version: O-Oja algorithm ('02). Simulation results demonstrate that the proposed algorithm realizes more stable convergence than O-Oja algorithm.

  • Detection of Leak Location in a Pipeline by Acoustic Signal

    Umut YUNUS  Masaru TSUNASAKI  Yiwei HE  Masanobu Kominami   Katsumi YAMASHITA  

     
    PAPER-Engineering Acoustics

      Vol:
    E91-A No:8
      Page(s):
    2053-2061

    Gas or water leaks in pipes that are buried under ground or that are situated in the walls of buildings may occur due to aging or unpredictable accidents, such as earthquakes. Therefore, the detection of leaks in pipes is an important task and has been investigated extensively. In the present paper, we propose a novel leak detection method by means of acoustic wave. We inject an acoustic chirp signal into a target pipeline and then estimate the leak location from the delay time of the compressed pulse by passing the reflected signal through a correlator. In order to distinguish a leak reflection in a complicated pipeline arrangement, the reflection characteristics of leaks are carefully discussed by numerical simulations and experiments. There is a remarkable difference in the reflection characteristics between the leak and other types of discontinuity, and the property can be utilized to distinguish the leak reflection. The experimental results show that, even in a complicated pipe arrangement including bends and branches, the proposed approach can successfully implement the leak detection. Furthermore, the proposed approach has low cost and is easy to implement because only a personal computer and some commonly equipment are required.

  • Single-Input Six-Output Voltage-Mode Filter Using Universal Voltage Conveyors

    Martin MINARCIK  Kamil VRBA  

     
    LETTER

      Vol:
    E91-A No:8
      Page(s):
    2035-2037

    In this letter a new structure of multifunctional frequency filter using a universal voltage conveyor (UVC) is presented. The multifunctional circuit can realize a low-pass, high-pass and band-pass filter. All types of frequency filter can be realized as inverting or non-inverting. Advantages of the proposed structure are the independent control of the quality factor at the cut-off frequency and the low output impedance of output terminals. The computer simulations and measuring of particular frequency filters are depicted.

  • Content-Adaptive Robust Image Watermarking with Posterior HMM-Based Detector

    Chuntao WANG  Jiangqun NI  Rongyue ZHANG  Goo-Rak KWON  Sung-Jea KO  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1953-1960

    Robustness and invisibility are two contrary constraints for robust invisible watermarking. Instead of the conventional strategy with human visual system (HVS) model, this paper presents a content-adaptive approach to further optimize the constraint between them. To reach this target, the entropy-based and integrated HVS (IHVS) based measures are constructed so as to adaptively choose the suitable components for watermark insertion and detection. Such a kind of scheme potentially gives rise to synchronization problem between the encoder and decoder under the framework of blind watermarking, which is then solved by incorporating the repeat-accumulate (RA) code with erasure and error correction. Moreover, a new hidden Markov model (HMM) based detector in wavelet domain is introduced to reduce the computation complexity and is further developed into a posterior one to avoid the transmission of HMM parameters with only a little sacrifice of detection performance. Experimental results show that the proposed algorithm can obtain considerable improvement in robustness performance with the same distortion as the traditional one.

  • On Increasing the Number of Users in (t, n) Threshold Secret Sharing Schemes

    Todorka ALEXANDROVA  Hiroyoshi MORITA  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2138-2150

    Constructing ideal (t,n) threshold secret sharing schemes leads to some limitations on the maximum number of users, that are able to join the secret sharing scheme. We aim to remove these limitations by reducing the information rate of the constructed threshold secret sharing schemes. In this paper we propose recursive construction algorithms of (t,n) threshold secret sharing schemes, based on the generalized vector space construction. Using these algorithms we are able to construct a (t,n) threshold secret sharing scheme for any arbitrary n.

  • Logic and Layout Aware Level Converter Optimization for Multiple Supply Voltage

    Liangpeng GUO  Yici CAI  Qiang ZHOU  Xianlong HONG  

     
    PAPER-VLSI Design Technology and CAD

      Vol:
    E91-A No:8
      Page(s):
    2084-2090

    Multiple supply voltage (MSV) is an effective scheme to achieve low power. Recent works in MSV are based on physical level and aim at reducing physical overheads, but all of them do not consider level converter, which is one of the most important issues in dual-vdd design. In this work, a logic and layout aware methodology and related algorithms combining voltage assignment and placement are proposed to minimize the number of level converters and to implement voltage islands with minimal physical overheads. Experimental results show that our approach uses much fewer level converters (reduced by 83.23% on average) and improves the power savings by 16% on average compared to the previous approach [1]. Furthermore, the methodology is able to produce feasible placement with a small impact to traditional placement goals.

  • A PSP-Kalman Receiver for Space-Time Trellis Coded OFDM Systems over Time-Varying Block Fading Channels

    Der-Feng TSENG  Chia-Ming LEE  

     
    LETTER

      Vol:
    E91-A No:8
      Page(s):
    2048-2052

    Space-time trellis coding systems employing orthogonal frequency division multiplexing technique over frequency-selective channels is considered, where fading gains vary within a frame interval. The channel time-evolution of each sub-carrier is modeled by an autoregressive process, while the receiver utilizing a recursive technique combining Kalman filtering with per-survivor processing is studied.

  • Low-Complexity Watermarking Based on Entropy Coding in H.264/AVC

    Young-Ho SEO  Hyun-Jun CHOI  Chang-Yeul LEE  Dong-Wook KIM  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2130-2137

    This paper is to propose a digital watermarking to protect the ownership of a video content which is compressed by H.264/AVC main profile. This scheme intends to be performed during the CABAC (Context-based Adaptive Binary Arithmetic Coding) process which is the entropy coding of the main profile. It uses the contexts extracted during the context modeling process of CABAC to position the watermark bits by simply checking the context values and determining the coefficients. The watermarking process is also as simple as replacing the watermark bit with the LSB (Least Significant Bit) of the corresponding coefficient to be watermarked. Experimental results from applying this scheme and attacking in various ways such as blurring, sharpening, cropping, Gaussian noise addition, and geometrical modification showed that the watermark embedded by this scheme has very high imperceptibility and robustness to the attacks. Thus, we expect it to be used as a good watermarking scheme, especially in the area that the watermarking should be performed during the compression process with requiring minimal amount of process for watermarking.

  • Consistency in a Chaotic Spiking Oscillator

    Tomohiro INAGAKI  Toshimichi SAITO  

     
    LETTER-Nonlinear Problems

      Vol:
    E91-A No:8
      Page(s):
    2240-2243

    This letter studies response of a chaotic spiking oscillator to chaotic spike-train inputs. The circuit can exhibits a variety of synchronous/asynchronous phenomena and we show an interesting phenomenon "consistency": the circuit can exhibit random response that is identical in steady steady state for various initial values. Presenting a simple test circuit, the consistency is confirmed experimentally.

  • On Generalized Feistel Structures Using the Diffusion Switching Mechanism

    Taizo SHIRAI  Kiyomichi ARAKI  

     
    PAPER-Cryptography and Information Security

      Vol:
    E91-A No:8
      Page(s):
    2120-2129

    To design secure blockciphers, estimating immunity against differential attack and linear attack is essential. Recently, Diffusion Switching Mechanism (DSM) is proposed as a design framework to enhance the immunity of Feistel structure against differential attack and linear attack. In this paper, we give novel results on the effect of DSM on three generalized Feistel structures, i.e. Type-I, Type-II and Nyberg's structures. We first show a method for roughly estimating lower bounds of a number of active S-boxes in Type-I and Type-II structures using DSM. Then we propose an improved search algorithm to find lower bounds for generalized structures efficiently. Experimental results obtained by the improved algorithm show that DSM raises lower bounds for all of the structures, and also show that Nyberg's structure has the slowest diffusion effect among them when SP-type F-functions are used.

  • High Resolution DOA Estimation Using Unwrapped Phase Information of MUSIC-Based Noise Subspace

    Koichi ICHIGE  Kazuhiko SAITO  Hiroyuki ARAI  

     
    PAPER

      Vol:
    E91-A No:8
      Page(s):
    1990-1999

    This paper presents a high resolution Direction-Of-Arrival (DOA) estimation method using unwrapped phase information of MUSIC-based noise subspace. Superresolution DOA estimation methods such as MUSIC, Root-MUSIC and ESPRIT methods are paid great attention because of their brilliant properties in estimating DOAs of incident signals. Those methods achieve high accuracy in estimating DOAs in a good propagation environment, but would fail to estimate DOAs in severe environments like low Signal-to-Noise Ratio (SNR), small number of snapshots, or when incident waves are coming from close angles. In MUSIC method, its spectrum is calculated based on the absolute value of the inner product between array response and noise eigenvectors, means that MUSIC employs only the amplitude characteristics and does not use any phase characteristics. Recalling that phase characteristics plays an important role in signal and image processing, we expect that DOA estimation accuracy could be further improved using phase information in addition to MUSIC spectrum. This paper develops a procedure to obtain an accurate spectrum for DOA estimation using unwrapped and differentiated phase information of MUSIC-based noise subspace. Performance of the proposed method is evaluated through computer simulation in comparison with some conventional estimation methods.

  • Leakage Current and Floating Gate Capacitor Matching Test

    Weidong TIAN  Joe R. TROGOLO  Bob TODD  

     
    INVITED PAPER

      Vol:
    E91-C No:8
      Page(s):
    1315-1320

    Capacitor mismatch is an important device parameter for precision analog applications. In the last ten years, the floating gate measurement technique has been widely used for its characterization. In this paper we describe the impact of leakage current on the technique. The leakage can come from, for example, thin gate oxide MOSFETs or high dielectric constant capacitors in advanced technologies. SPICE simulation, bench measurement, analytical model and numerical analyses are presented to illustrate the problem and key contributing factors. Criteria for accurate capacitor systematic and random mismatch characterization are developed, and practical methods of increasing measurement accuracy are discussed.

  • On the Stopping Distance and Stopping Redundancy of Finite Geometry LDPC Codes

    Hai-yang LIU  Xiao-yan LIN  Lian-rong MA  Jie CHEN  

     
    PAPER-Coding Theory

      Vol:
    E91-A No:8
      Page(s):
    2159-2166

    The stopping distance and stopping redundancy of a linear code are important concepts in the analysis of the performance and complexity of the code under iterative decoding on a binary erasure channel. In this paper, we studied the stopping distance and stopping redundancy of Finite Geometry LDPC (FG-LDPC) codes, and derived an upper bound of the stopping redundancy of FG-LDPC codes. It is shown from the bound that the stopping redundancy of the codes is less than the code length. Therefore, FG-LDPC codes give a good trade-off between the performance and complexity and hence are a very good choice for practical applications.

9941-9960hit(21534hit)